Create Decentralized Data Backups With The Help Of Your SafeKey’s Internal Storage.
SafeKey has been designed with custom internal storage that allows encrypted shares of sensitive data to be stored offline. SafeKey is also the only device that’s compatible with Inheriti®, our platform to create your own data backup plans.
Thanks to our self-developed and patented Secret Shares Distribution Protocol (SSDP) you can easily set up data backup plans with a combination of your SafeKey and Inheriti®. This unique process is developed so that you (or multiple people if you want) can safely maintain (shared) ownership of your data via different SafeKey(s).
If a backup plan ever needs to be opened, the SafeKeys have to be brought together to merge and decrypt the individual shares. If that’s done successfully, the secret data gets revealed. Until then, the data stays decentralized and secret, only known to you as the creator of the backup plan. Each individual share is useless on its own but when all the shares are together, they reconstruct the original secret.Get your SafeKey Introduction to SafeKey
What Is A Decentralized Data Backup?
A decentralized data backup plan allows you to securely distribute private information— “secrets” — in different encrypted shares amongst an untrusted network, which makes it decentralized. In our case: different SafeKeys in combination with the blockchain.
A secure data backup plan helps you to store data in such a way that it is unreadable or unhackable, in difference to storing secret data in plain text on your computer or hard drive.
Setup a decentralized data backup plan to keep your digital assets such as private keys, seed phrases, bank accounts, digital wallets, passwords, photos, videos, receipts, lyrics, certain online accounts or even your biggest untold secrets safe.Get your SafeKey Introduction to SafeKey
The Problem With Traditional Data Backups And Storage Devices.
In an advancing digital world, the distribution of secret data is critical in terms of digital assets and private information. Currently, centralized digital vaults or personal hard drives act as digital ‘safe havens’ for data but these storage methods are under constant threat from hackers aimed at gaining access to your private data.
The rise of the internet and digital assets requires a more secure method of safeguarding information which can harbor high valuations. Available backup options require trust in a trustless world and are no longer effective in providing the most secure methods of storing sensitive data.
Have you ever thought about what would happen if your hard drive crashes? Or the company that builds your password manager gets hacked or disappears?
There should be better and safer ways to keep your data safe, right?Get your SafeKey Introduction to SafeKey
Prevent Data Loss With Your Immutable Decentralized Backup Plan.
Have you ever thought about what happens if someone intercepts one of your personal devices or backups and gets hold of the required passwords for your online accounts? Or even worse, gets the private keys or seed phrases of your crypto wallets. One person can easily steal all your funds or hide all your data without you even noticing.
A decentralized backup plan created with Inheriti® and stored on multiple SafeKeys gives you the power to keep control over your assets forever.
- Private keys and seed phrases to access your crypto and NFTs
- Email accounts
- Social media accounts
- Data from all your devices: computers, smartphones, …
- All data stored on your hard drives or in your cloud
- Domain names
- Bank accounts and investments
So how does it work?Get your SafeKey Introduction to SafeKey
How Do Decentralized Backups Work With Your SafeKey?
The most secure solution is to create your own decentralized data backup plans through Inheriti® in combination with multiple SafeKeys. It’s the only 100% decentralized solution available and its unique Secret Shares Distribution Protocol (SSDP) has multiple patents in different jurisdictions around the world.
Simply said: Inheriti® encrypts and splits data into secret shares. Those shares are then stored on multiple SafeKey devices and have to be brought back together in order to reveal the data.
Important to note here is that you never directly store your passwords, private keys or seed phrases on your SafeKeys. Instead you leave encrypted shares which are useless and unreadable on their own. No one will ever have access to your data or will be able to read it, not even SafeKey or Inheriti®.
You’re the only one that knows what data gets encrypted.
With this, SafeKey is finally enabling people to confidently backup private credentials in a way that is secure and empowering by smartly applying Shamir’s Secret Sharing Algorithm.Get your SafeKey Introduction to SafeKey
Shamir’s Secret Sharing Algorithm.
Shamir’s Secret Sharing Algorithm is a way to split a secret, like a password or a passcode, into multiple pieces called “shares”. These shares can be given to different people, and any subset of them can be combined together to reveal the original secret. However, if any one share is lost or stolen, the secret cannot be reconstructed.
One of the key advantages of Shamir’s Secret Sharing Algorithm is that it allows for flexible access to the secret. For example, you can create a situation where any two shares can be used to reconstruct the secret, or you can require that all five shares be used. This allows you to tailor the security of the secret to your specific needs.Get your SafeKey Introduction to SafeKey
Benefits Of Using Your SafeKey For Decentralized Backups.
SafeKey in combination with Inheriti® is the safest and only 100% decentralized solution for your secure data backups.
- Stop worrying about your secret data
- Keep control over your own data, forever
- Store data into separate encrypted unreadable shares
- Create multiple backups
- Eliminate intermediaries
- Avoid data loss
- SafeKey allows you to plausibly deny the existence of data
- Use tamper proof and patented technology
- Highest standards of security and military grade encryption
- Ongoing independent audits
- 3-Layer topology
- Lifetime validity
- 100% decentralized
- No critical information is stored in databases
Get Started With A SafeKey!
You should select your SafeKey based on the services (i.e. websites and apps) and devices you want to use the SafeKey with. Please see the resources below to help you decide on which SafeKey will be your best fit.
Start Using Your SafeKey
Get strong security in minutes with the SafeKey, a hardware security key that provides phishing-resistant two-factor authentication and encrypted data storage.Start now
Why Use A SafeKey?
Discover why you should use a SafeKey and how it'll help you eliminate the security vulnerabilities you're facing today.Learn more
Other Crypto Use Cases
Avoid that your crypto exchange accounts are getting hacked by simply using a SafeKey.Learn more
Store private keys and seed phrases in the most secure way possible and make them theft-, loss-, and hacker-proof.Learn more
Safely pass along your cryptocurrencies and NFTs after your death, without using a middleman.Learn more
A decentralized backup plan created with Inheriti® and stored on multiple SafeKeys gives you the power to keep control over your assets forever.Learn more
If you don’t want your seed phrases, private keys, passwords, exchange accounts, … fall in the hand of malicious people, you have to take your security one step further.Learn more
Stop modern threats and keep your web3 assets like your cryptocurrencies and NFTs, or user accounts for exchanges, safe at all times.Learn more